CVE-2020-37171

6.2 MEDIUM

📋 TL;DR

CVE-2020-37171 is a buffer overflow vulnerability in TapinRadio's proxy username configuration that allows local attackers to crash the application via denial of service. Attackers can overwrite the username field with excessive data (10,000 bytes) to trigger application instability. This affects TapinRadio users with proxy configuration enabled.

💻 Affected Systems

Products:
  • TapinRadio
Versions: 2.12.3 and likely earlier versions
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when proxy configuration is enabled and accessible to local users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash preventing radio streaming functionality, requiring application restart and potential data loss of current session settings.

🟠

Likely Case

Application becomes unresponsive and crashes, disrupting radio streaming until manually restarted.

🟢

If Mitigated

Minimal impact with proper input validation and buffer size limits in place.

🌐 Internet-Facing: LOW - Requires local access to the application's configuration interface.
🏢 Internal Only: MEDIUM - Local users with access to the application could disrupt service for themselves or other users on shared systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access to modify proxy settings. Simple buffer overflow technique with publicly available proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.12.4 or later

Vendor Advisory: https://www.raimersoft.com/php/tapinradio.php

Restart Required: Yes

Instructions:

1. Download latest version from official website. 2. Run installer to update. 3. Restart TapinRadio application.

🔧 Temporary Workarounds

Disable Proxy Configuration

windows

Remove or disable proxy settings in TapinRadio to eliminate attack vector.

Open TapinRadio > Options > Network > Disable 'Use proxy server'

Restrict Local Access

windows

Limit application access to trusted users only on shared systems.

🧯 If You Can't Patch

  • Disable proxy server functionality in TapinRadio settings.
  • Implement application whitelisting to prevent unauthorized modifications to TapinRadio configuration.

🔍 How to Verify

Check if Vulnerable:

Check TapinRadio version in Help > About. If version is 2.12.3 or earlier and proxy is configured, system is vulnerable.

Check Version:

In TapinRadio: Help > About displays version information

Verify Fix Applied:

Verify version is 2.12.4 or later in Help > About. Test proxy configuration with large username input to confirm stability.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from TapinRadio
  • Windows Event Logs showing application failures

Network Indicators:

  • Unusual proxy configuration changes followed by application termination

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="tapinradio.exe"

🔗 References

📤 Share & Export